JP7369501B2 - 人工知能を使用した認証されていないapi要求が存在する場合の不適切な活動の検出 - Google Patents

人工知能を使用した認証されていないapi要求が存在する場合の不適切な活動の検出 Download PDF

Info

Publication number
JP7369501B2
JP7369501B2 JP2021523187A JP2021523187A JP7369501B2 JP 7369501 B2 JP7369501 B2 JP 7369501B2 JP 2021523187 A JP2021523187 A JP 2021523187A JP 2021523187 A JP2021523187 A JP 2021523187A JP 7369501 B2 JP7369501 B2 JP 7369501B2
Authority
JP
Japan
Prior art keywords
api
unauthenticated
behavior
classifier
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2021523187A
Other languages
English (en)
Japanese (ja)
Other versions
JP2022515007A (ja
Inventor
ユ、シュエジエ
バーテルト、マティアス
ハウプトマン、マニュエル
ウィリアムズ、ロン
ティラフン、リディヤ
クマーリ、アーチャナ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of JP2022515007A publication Critical patent/JP2022515007A/ja
Application granted granted Critical
Publication of JP7369501B2 publication Critical patent/JP7369501B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biophysics (AREA)
  • Molecular Biology (AREA)
  • Mathematical Physics (AREA)
  • Biomedical Technology (AREA)
  • Artificial Intelligence (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
JP2021523187A 2018-12-26 2019-12-16 人工知能を使用した認証されていないapi要求が存在する場合の不適切な活動の検出 Active JP7369501B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US16/232,337 2018-12-26
US16/232,337 US11303659B2 (en) 2018-12-26 2018-12-26 Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence
PCT/IB2019/060828 WO2020136497A1 (en) 2018-12-26 2019-12-16 Detecting inappropriate activity in the presence of unauthenticated api requests using artificial intelligence

Publications (2)

Publication Number Publication Date
JP2022515007A JP2022515007A (ja) 2022-02-17
JP7369501B2 true JP7369501B2 (ja) 2023-10-26

Family

ID=71123413

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2021523187A Active JP7369501B2 (ja) 2018-12-26 2019-12-16 人工知能を使用した認証されていないapi要求が存在する場合の不適切な活動の検出

Country Status (6)

Country Link
US (1) US11303659B2 (de)
JP (1) JP7369501B2 (de)
CN (1) CN113302609B (de)
DE (1) DE112019004913T5 (de)
GB (1) GB2594217B (de)
WO (1) WO2020136497A1 (de)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10685293B1 (en) * 2017-01-20 2020-06-16 Cybraics, Inc. Methods and systems for analyzing cybersecurity threats
US10972740B2 (en) 2018-03-06 2021-04-06 Forcepoint, LLC Method for bandwidth reduction when streaming large format multi-frame image data
US11140190B2 (en) 2018-10-23 2021-10-05 Forcepoint, LLC Automated user module assessment
US11048611B2 (en) * 2018-11-29 2021-06-29 Forcepoint, LLC Web extension JavaScript execution control by service/daemon
US11397832B2 (en) * 2018-12-04 2022-07-26 Dhiraj Sharan Virtual data lake system created with browser-based decentralized data access and analysis
US11132973B2 (en) 2019-02-01 2021-09-28 Forcepoint, LLC System for capturing images from applications rendering video to a native platform with a graphics rendering library
GB2581996B (en) * 2019-03-07 2021-10-20 F Secure Corp Method of threat detection in a computer network security system
US10917382B2 (en) 2019-04-03 2021-02-09 Forcepoint, LLC Virtual point of presence in a country to allow for local web content
US11431743B2 (en) 2020-02-03 2022-08-30 Forcepoint, LLC Cross domain dynamic data protection intermediary message transform platform
US11425155B2 (en) * 2020-03-12 2022-08-23 The Aerospace Corporation Monitoring the integrity of a space vehicle
US10917401B1 (en) 2020-03-24 2021-02-09 Imperva, Inc. Data leakage prevention over application programming interface
US20220164457A1 (en) * 2020-11-24 2022-05-26 International Business Machines Corporation Automatically adjusting data access policies in data analytics
US20220179908A1 (en) * 2020-12-03 2022-06-09 Institute For Information Industry Information security device and method thereof
US11652828B1 (en) 2021-01-11 2023-05-16 Wells Fargo Bank, N.A. Systems and methods for automated anomalous behavior detection and risk-scoring individuals
US11727077B2 (en) * 2021-02-05 2023-08-15 Microsoft Technology Licensing, Llc Inferring information about a webpage based upon a uniform resource locator of the webpage
US20220294788A1 (en) * 2021-03-09 2022-09-15 Oracle International Corporation Customizing authentication and handling pre and post authentication in identity cloud service
US20220337633A1 (en) * 2021-04-15 2022-10-20 Anamika Bhattacharya Heuristic model to self-manage and auto-update containerized services
CN113536302A (zh) * 2021-07-26 2021-10-22 北京计算机技术及应用研究所 一种基于深度学习的接口调用者安全评级方法
US20230073891A1 (en) * 2021-09-09 2023-03-09 Beijing Bytedance Network Technology Co., Ltd. Multifunctional application gateway for security and privacy
US12088609B1 (en) * 2021-09-29 2024-09-10 Amazon Technologies, Inc. Investigative playbooks for cloud security events
US20230177430A1 (en) * 2021-12-07 2023-06-08 International Business Machines Corporation Streamlining project requests for information
US20230401308A1 (en) * 2022-06-14 2023-12-14 Unbiased Security Ltd. Interactive security orchestration
CN115086075B (zh) * 2022-07-21 2022-12-27 深圳市永达电子信息股份有限公司 一种行为可信的强制访问控制方法及装置
WO2024028803A1 (en) * 2022-08-04 2024-02-08 DALVI, Suhas Ramkrishna Method and system for preventing application programming interface attacks via channel for transmission of data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013145510A (ja) 2012-01-16 2013-07-25 Kddi Corp Api実行制御装置およびプログラム
US20170244737A1 (en) 2016-02-23 2017-08-24 Zenedge, Inc. Analyzing Web Application Behavior to Detect Malicious Requests

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090158407A1 (en) 2007-12-13 2009-06-18 Fiberlink Communications Corporation Api translation for network access control (nac) agent
US8955133B2 (en) * 2011-06-09 2015-02-10 Microsoft Corporation Applying antimalware logic without revealing the antimalware logic to adversaries
US9406030B2 (en) 2011-07-28 2016-08-02 Au10Tix Limited System and methods for computerized machine-learning based authentication of electronic documents including use of linear programming for classification
US9386078B2 (en) * 2014-05-30 2016-07-05 Ca, Inc. Controlling application programming interface transactions based on content of earlier transactions
US10264016B2 (en) * 2014-07-10 2019-04-16 Metacert, Inc. Methods, systems and application programmable interface for verifying the security level of universal resource identifiers embedded within a mobile application
WO2016043734A1 (en) * 2014-09-17 2016-03-24 Hewlett Packard Enterprise Development Lp Neural network verification
WO2016168368A1 (en) * 2015-04-13 2016-10-20 Secful, Inc. System and method for identifying and preventing malicious api attacks
US20190258818A1 (en) * 2016-02-08 2019-08-22 Consumerinfo.Com, Inc. Smart access control system for implementing access restrictions of regulated database records based on machine learning of trends
US9762611B2 (en) * 2016-02-16 2017-09-12 Cylance Inc. Endpoint-based man in the middle attack detection using machine learning models
US20180018459A1 (en) * 2016-07-15 2018-01-18 Trustlook Inc. Notification of Maliciousness Categorization of Application Programs for Mobile Devices
CN106650418A (zh) 2016-12-21 2017-05-10 天津大学 基于多策略的Android访问控制系统及方法
CN107315950B (zh) 2017-05-03 2020-10-09 北京大学 一种云计算平台管理员权限最小化的自动化划分方法及访问控制方法
US10581873B2 (en) * 2017-07-11 2020-03-03 Cisco Technology, Inc. Securing micro-services
US10282241B1 (en) * 2017-07-19 2019-05-07 Vinyl Development LLC Data driven API conversion
US10887333B1 (en) * 2017-08-03 2021-01-05 Amazon Technologies, Inc. Multi-tenant threat intelligence service
US10565372B1 (en) * 2017-08-03 2020-02-18 Amazon Technologies, Inc. Subscription-based multi-tenant threat intelligence service
WO2019048034A1 (en) * 2017-09-06 2019-03-14 Swiss Reinsurance Company Ltd. ELECTRONIC TRACKING AND RECORDING IDENTIFICATION SYSTEM FOR TELEMATIC DEVICES, AND CORRESPONDING METHOD THEREOF
US10956573B2 (en) * 2018-06-29 2021-03-23 Palo Alto Networks, Inc. Dynamic analysis techniques for applications
US10733292B2 (en) * 2018-07-10 2020-08-04 International Business Machines Corporation Defending against model inversion attacks on neural networks
US10997291B2 (en) * 2018-07-19 2021-05-04 Juniper Networks, Inc. Extending dynamic detection of malware using static and dynamic malware analyses
US11574051B2 (en) * 2018-08-02 2023-02-07 Fortinet, Inc. Malware identification using multiple artificial neural networks
US10880328B2 (en) * 2018-11-16 2020-12-29 Accenture Global Solutions Limited Malware detection

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013145510A (ja) 2012-01-16 2013-07-25 Kddi Corp Api実行制御装置およびプログラム
US20170244737A1 (en) 2016-02-23 2017-08-24 Zenedge, Inc. Analyzing Web Application Behavior to Detect Malicious Requests

Also Published As

Publication number Publication date
GB2594217B (en) 2023-01-04
GB2594217A (en) 2021-10-20
GB202110462D0 (en) 2021-09-01
CN113302609B (zh) 2023-04-18
US20200213336A1 (en) 2020-07-02
CN113302609A (zh) 2021-08-24
US11303659B2 (en) 2022-04-12
JP2022515007A (ja) 2022-02-17
WO2020136497A1 (en) 2020-07-02
DE112019004913T5 (de) 2021-06-17

Similar Documents

Publication Publication Date Title
JP7369501B2 (ja) 人工知能を使用した認証されていないapi要求が存在する場合の不適切な活動の検出
US11362910B2 (en) Distributed machine learning for anomaly detection
US11748480B2 (en) Policy-based detection of anomalous control and data flow paths in an application program
JP6687799B2 (ja) マルチテナント環境のためのネットワークフローログ
CN107409126B (zh) 用于保护企业计算环境安全的系统和方法
Kumar et al. A robust intelligent zero-day cyber-attack detection technique
JP2019153336A (ja) 電子メッセージベースのセキュリティ脅威の自動軽減
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
US11494488B2 (en) Security incident and event management use case selection
Tudosi et al. Design and implementation of a distributed firewall management system for improved security
Zammit A machine learning based approach for intrusion prevention using honeypot interaction patterns as training data
Mishra et al. Intrusion detection system with snort in cloud computing: advanced IDS
Gnatyuk et al. Cloud-Based Cyber Incidents Response System and Software Tools
Deshpande et al. Optimization of security as an enabler for cloud services and applications
Niu et al. Security analysis model, system architecture and relational model of enterprise cloud services
Rak et al. Developing secure cloud applications
Jolkkonen Cloud Asset Identification Strategy
Attak et al. SHIELD: Securing against intruders and other threats through an NFV-enabled environment
Chatterjee Red Hat and IT Security
Abduvaliyevich et al. Creation and Security of the Cloud Platform for Educational Technologies
Bissict Augmenting security event information with contextual data to improve the detection capabilities of a SIEM
Gardikis et al. Updated specifications, design, and architecture for the usable information driven engine
Tyagi et al. Watchguard Status and Task Management Tool
Olaussen Towards a Security Design Pattern for Web APIs
Singh Virdi AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20220128

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20220512

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20220526

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20230524

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20230613

RD12 Notification of acceptance of power of sub attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7432

Effective date: 20230710

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20230911

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20230926

RD14 Notification of resignation of power of sub attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7434

Effective date: 20230927

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20231012

R150 Certificate of patent or registration of utility model

Ref document number: 7369501

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150